CN109918907A - Linux platform proceeding internal memory malicious code evidence collecting method, controller and medium - Google Patents
Linux platform proceeding internal memory malicious code evidence collecting method, controller and medium Download PDFInfo
- Publication number
- CN109918907A CN109918907A CN201910094079.1A CN201910094079A CN109918907A CN 109918907 A CN109918907 A CN 109918907A CN 201910094079 A CN201910094079 A CN 201910094079A CN 109918907 A CN109918907 A CN 109918907A
- Authority
- CN
- China
- Prior art keywords
- memory
- file
- dynamic library
- malicious code
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The present invention relates to a kind of Linux platform proceeding internal memory malicious code evidence collecting method, controller and media to read the Memory Mapping File of all processes the method includes traversing all processes of linux system;One of the corresponding all memory fragment datas of the process, program file routing information and dynamic library file path information or a variety of are obtained based on each proceeding internal memory mapped file, according to the corresponding all memory fragment datas of each process and program file routing information, or, the dynamic library file path information for including in all memory fragment datas and Memory Mapping File, alternatively, the malicious code of the program file corresponding dynamic library file path infomation detection process.The present invention utilizes the proceeding internal memory mapped file of (SuSE) Linux OS, determine the memory address layout of process, the complete memory of each process in accurate acquisition system, malicious code effectively in discovery linux system memory, the safety of system Linux is improved, deposit has versatility and stability inside on evidence collecting method.
Description
Technical field
The present invention relates to technical field of network security more particularly to a kind of Linux platform proceeding internal memory malicious code to collect evidence
Method, controller and medium.
Background technique
Linux system is a widely applied computer operating system, national important mechanism, bank, operator, interconnection
The various fields such as net industry have a large amount of deployment and use.Hacker's tissue payes attention to always the infiltration to linux system for a long time
And control, Linux server are also the important goal that advanced persistence threatens (APT).It is taken at present in linux system malicious code
Card aspect, be primarily present two bottlenecks: the first, rogue program utilize advanced concealing technology and coding techniques so that its be difficult to by
It was found that and analysis, and these rogue programs threaten entire information system bring and endanger and can not estimate;The second, at present
Still immature for the attack forensic technologies of Linux server system, mature tool or system can not help business
Personnel carry out efficient forensics analysis work to suspicious server.In face of the Linux server attacked, in its system process
The efficient security forensics of row are deposited into, crucial malicious code is therefrom extracted, is one of the pith in security incident response.
The existing linux system progress safety detection method that is directed to includes: virus scan detection, general rootkit detection
Class, Host-based intrusion detection, log analysis detection and particular detection etc., but the above method detected both for system file feature or
The detection (such as hidden process, hide connection) of part specific content, lack complete set for linux system proceeding internal memory
Malicious Code Detection technology.And in actually evidence obtaining, the malicious code operated in linux system memory is entire malicious attack
In core therefore how effectively to find the malicious code in linux system memory, block malicious attack in time, reduce
Bring loss is attacked, security of system is improved, becomes technical problem urgently to be resolved.
Summary of the invention
Technical problem to be solved by the present invention lies in provide a kind of Linux platform proceeding internal memory malicious code evidence obtaining side
Method, controller and medium determine the memory address layout of process using the proceeding internal memory mapped file of (SuSE) Linux OS, from
And the complete memory of each process in system is accurately obtained, it effectively finds the malicious code in linux system memory, improves
The safety of system Linux, deposit has versatility and stability inside on evidence collecting method.
In order to solve the above-mentioned technical problems, the present invention provides a kind of Linux platform proceeding internal memory malicious code evidence obtaining sides
Method, comprising:
All processes of linux system are traversed, the Memory Mapping File of all processes is read;
The corresponding all memory fragment datas of the process, program file are obtained based on each proceeding internal memory mapped file
One of routing information and dynamic library file path information are a variety of, and the dynamic library file path information includes memory mapping
The corresponding dynamic library file path information of the program file for including in file and the corresponding dynamic library file path letter of program file
Breath;
According to the corresponding all memory fragment datas of each process and program file routing information, alternatively, all Memory slices
The dynamic library file path information for including in segment data and Memory Mapping File, alternatively, the corresponding dynamic library file of program file
Routing information detects the malicious code of the process.
Further, all processes of the traversal linux system, read the Memory Mapping File of all processes, comprising:
Obtain linux system process number maximum value;
It is starting point with process number 1, using the process number maximum value as terminal, traverses process under process catalogue/proc
Catalogue/proc/pid/ obtains all processes of system;
For each process subdirectory/proc/pid/, the corresponding Memory Mapping File of the process is obtained.
Further, during process subdirectory/proc/pid/ under the traversal process catalogue/proc, if traversal is extremely
Default process, then directly skip, and continues to traverse next process, the default process includes kernel thread and memory evidence obtaining process.
Further, all internal storage datas of each process are obtained based on the proceeding internal memory mapped file, comprising:
Using the process for currently carrying out obtaining memory information as target process, the corresponding memory mapping of the target process is read
File parses wherein full memory piece segment information, obtains initial address and the end address of each memory segment;
Calling system debugging function ptrace reads memory of each memory segment between initial address to end address
Data;
Calling system file manipulation function open/write stores the corresponding memory number of each memory segment read
According to until all memory segments reading of the target process finishes, the internal storage data of the target process individually stores one
Catalogue.
It further, should be into according to the corresponding all memory fragment datas of each process and the detection of program file routing information
The malicious code of journey, comprising:
The pre-set code section in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process;
According to described program file path information acquiring program file;
The corresponding program header structure of described program file is analyzed, the corresponding pre-set code section of the program file is obtained;
By in the proceeding internal memory pre-set code section and the corresponding pre-set code section of program file compare, if it exists
It is different, then it represents that there are malicious code, to export the program file and corresponding memory fragment data.
Further, according to the dynamic for including in the corresponding all memory fragment datas of each process and Memory Mapping File
Library file routing information detects the malicious code of the process, comprising:
The pre-set code section in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process;
According to the dynamic library file path acquisition of information dynamic library file for including in Memory Mapping File;
The corresponding program header file of the dynamic library file is analyzed, the corresponding pre-set code section of the dynamic library file is obtained;
By in the proceeding internal memory pre-set code section and the corresponding pre-set code section of dynamic library file compare, if depositing
In difference, then it represents that there are malicious codes, export dynamic library file and corresponding memory fragment data.
Further, the pre-set code section is .text segment data.
Further, according to the corresponding dynamic library file path infomation detection process of the corresponding program file of each process
Malicious code, comprising:
According to the corresponding dynamic library file path information of the corresponding program file of each process, it is corresponding dynamic to obtain the process
State library file list;
Obtain the dynamic library file information for including in the corresponding Memory Mapping File of the process;
The living document information for including in the Memory Mapping File and the dynamic library file list are compared;
If in the Memory Mapping File including one or more not living documents in the dynamic library file list,
It then indicates to export the dynamic library file path and corresponding memory fragment data there are malicious code.
Another aspect according to the present invention provides a kind of controller comprising memory and processor, the memory storage
There is the step of computer program, described program can be realized the method when being executed by the processor.
Another aspect according to the present invention provides a kind of computer readable storage medium, described for storing computer instruction
The step of instruction realizes the method when by a computer or processor execution.
The present invention has obvious advantages and beneficial effects compared with the existing technology.By above-mentioned technical proposal, the present invention
A kind of Linux platform proceeding internal memory malicious code evidence collecting method, controller and medium can reach comparable technical progress and reality
With property, and with the extensive utility value in industry, at least have the advantage that
The present invention utilizes the proceeding internal memory mapped file of (SuSE) Linux OS, determines the memory address layout of process, thus
The complete memory of each process in accurate acquisition system, the memory information between each process is mutually indepedent, and then effectively sends out
Malicious code in existing linux system memory, method is simply accurate, improves the safety of system Linux.The present invention is more traditional
System original memory evidence obtaining, avoid the complete acquisition and independent acquisition of each proceeding internal memory, deposit on evidence collecting method inside
With versatility and stability.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the invention can
It is clearer and more comprehensible, it is special below to lift preferred embodiment, and cooperate attached drawing, detailed description are as follows.
Detailed description of the invention
Fig. 1 provides Linux platform proceeding internal memory malicious code evidence collecting method schematic diagram for one embodiment of the invention;
Fig. 2 is all internal storage data schematic diagrames that one embodiment of the invention obtains process based on proceeding internal memory mapped file.
Specific embodiment
It is of the invention to reach the technical means and efficacy that predetermined goal of the invention is taken further to illustrate, below in conjunction with
Attached drawing and preferred embodiment, to a kind of Linux platform proceeding internal memory malicious code evidence collecting method proposed according to the present invention, control
The specific embodiment and its effect of device and medium, detailed description is as follows.
The embodiment of the invention provides a kind of Linux platform proceeding internal memory malicious code evidence collecting methods, as shown in Figure 1, packet
Include following steps:
Step S1, all processes of linux system are traversed, the Memory Mapping File of all processes is read;
Step S2, the corresponding all memories of the process are obtained based on each proceeding internal memory mapped file (maps file)
One of fragment data, program file routing information and dynamic library file path information are a variety of, the dynamic library file road
Diameter information includes that the corresponding dynamic library file path information of program file for including and program file are corresponding in Memory Mapping File
Dynamic library file path information;
Wherein, according to the filename character string for including in process maps file, the corresponding program file of process can be obtained
The dynamic library file path information of routing information and dependence.
Step S3, according to the corresponding all memory fragment datas of each process and program file routing information, alternatively, all
The dynamic library file path information for including in memory fragment data and Memory Mapping File, alternatively, the corresponding dynamic of program file
Library file routing information detects the malicious code of the process.
It loops through, until having detected the proceeding internal memory of all evidence obtainings.
As an example, the step S1 includes:
Step S11, linux system process number maximum value is obtained;
It specifically, can be by obtaining linux system kernel setup parameter (/proc/sys/kernel/pid_max), to obtain
Take the maximum value of system process number.
It step S12, is starting point with process number 1 using Linux file directory access characteristics, with the process number maximum value
For terminal, process subdirectory/proc/pid/ under process catalogue/proc is traversed, obtains all processes of system;
Since the process number run in system is limited, which is equally effective for hidden process.It is directed to Linux system simultaneously
Thread in system, it is also the same effective.Process number pid and maps file effective in each ergodic process is corresponded.
Step S13, it is directed to each process subdirectory/proc/pid/, obtains the corresponding Memory Mapping File of the process, this
Outside, process can be also obtained simultaneously opens file, the information such as process Parameter File.
During the entire process of traversing evidence obtaining, memory evidence obtaining program operation can also generate a system process, i.e., interior access
Card process, and the process is not centainly malicious process, in addition, kernel thread is also not malicious process, without to memory
Evidence obtaining process and kernel thread carry out memory evidence obtaining, to improve the efficiency of program operation.Therefore, in the traversal process mesh
During process subdirectory/proc/pid/ under record/proc, if traversal is directly skipped, is continued under traversal to default process
One process, the default process include kernel thread and memory evidence obtaining process.
Every row represents a memory segment in maps file, behind be corresponding with file path, i.e. program file path and dynamic
State library file path.Each program file or dynamic library file include several memory segments, and wherein .text segment data is located at each
The first row in memory segment that file is included.The full memory piece segment information of each process is included in process maps file
In, according to every a line in the maps file of process, the memory fragment data of each process is read out, then according to memory
The initial address of segment stores in disk one by one, with the name of memory initial address.As an example, in the step S2,
All internal storage datas of each process are obtained based on the proceeding internal memory mapped file, can pass through system application interface API
Each integrated all segmentation memories are obtained, as shown in Fig. 2, specifically can comprise the following steps that
Step S21, using the process for currently carrying out obtaining memory information as target process, it is corresponding to read the target process
Memory Mapping File parses wherein full memory piece segment information, obtains the initial address and end of each memory segment
Address;
Step S22, calling system debugging function ptrace read each memory segment from initial address to end address it
Between internal storage data;
Step S23, each memory segment that calling system file manipulation function open/write storage is read is corresponding
Internal storage data, until the target process all memory segments reading finish, the internal storage data of the target process is independent
Store a catalogue.
Wherein, internal storage data may include program code segments memory, program data section memory, dynamic base memory, stack memory,
Anonymity mapping memory etc..
As an example, the initial address of proceeding internal memory segment and length according to obtained in step S21 (rise end address-
Beginning address), obtain the content of each memory segment of process in a binary fashion, and be saved in file respectively, filename is with memory
The initial address of segment is named.Filename is named with the initial address of memory segment.It loops through, by the memory number of all processes
It is finished according to by step S21- step S23 acquisition.
Further describe step S21- step S23 below by way of a specific example, using system function ptrace into
Journey additional function parameter (PTRACE_ATTACH), is attached to target process, and target process is made to enter debugging mode, operation suspension,
Wait the subsequent operation of ptrace.If the maps file of some pid reads failure, indicate that the process is kernel thread, or
Process there is no etc., then traverse next process pid;If it succeeds, starting the memory read functions parameter of calling ptrace
It (PTRACE_PEEKTEXT), is single according to 4 bytes according to the initial address and length of each memory segment in maps file
Position, sequence read the internal storage data of corresponding length.Each pid individually creates a directory, and stores under catalogue all with Memory slice
The internal storage data file of sector address name.It is finished when memory segment all in maps file is read, calls ptrace function
Process detachment function parameter (PTRACE_DETACH) is detached from from target process, target process is made to resume operation.
After proceeding internal memory in each system is read, then Malicious Code Detection is carried out by step S3, in step S3
Including Through Several Survey Measure, it is illustrated below by way of three embodiments:
Embodiment one,
The malice of the process is detected according to the corresponding all memory fragment datas of each process and program file routing information
Code, comprising:
Step S301, the pre-set code in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process
Section;
Step S302, according to described program file path information acquiring program file;
Step S303, the corresponding program header structure of analysis described program file, obtains the program file corresponding default generation
Code section;
Especially by analysis program file elf structure, corresponding program header structure is obtained, program header contains this document fortune
When row, layout scenarios in memory, program connector (essential tool in code compilation process) is by many program segments
(i.e. sections) is connected as an application heap (i.e. segment), and the purposes of each segment is different with memory permission, has
It reads to execute the segment of (rx) permission to include dynamic relocatable section (.rela.dyn), program chains relocatable section
The sections such as (.rela.plt), code segment (.text), the content that this segment includes are the code assembly instructions of program
Part.As an example, the pre-set code section is .text segment data.
Step S304, by the proceeding internal memory pre-set code section and the corresponding pre-set code section of program file carry out pair
Than different if it exists, then it represents that there are malicious code, to export the program file and corresponding memory fragment data.
Embodiment two,
According to the dynamic library file road for including in the corresponding all memory fragment datas of each process and Memory Mapping File
The malicious code of the diameter infomation detection process, comprising:
Step S311, the pre-set code in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process
Section;
Step S312, according to the dynamic library file path acquisition of information dynamic library file for including in Memory Mapping File;
Step S313, the corresponding program header file of the dynamic library file is analyzed, it is corresponding pre- to obtain the dynamic library file
If code segment;
Especially by analysis dynamic library file elf structure, corresponding program header structure is obtained, it is as an example, described
Pre-set code section is .text segment data.
Step S314, by the pre-set code section and the corresponding pre-set code section progress of dynamic library file in the proceeding internal memory
Comparison, it is different if it exists, then it represents that there are malicious codes, export dynamic library file and corresponding memory fragment data.
Embodiment three,
According to the malice generation of the corresponding program file of each process corresponding dynamic library file path infomation detection process
Code, comprising:
Step S321, according to the corresponding dynamic library file path information of the corresponding program file of each process, obtaining should be into
The corresponding dynamic library file list of journey;
Step S322, the dynamic library file information for including in the corresponding Memory Mapping File of the process is obtained;
Step S323, by the living document information for including in the Memory Mapping File and the dynamic library file list into
Row comparison;
If in step S324, the described Memory Mapping File comprising one or more not in the dynamic library file list
Living document, then it represents that there are malicious code, export the dynamic library file path and corresponding memory fragment data.
It should be noted that three above embodiment is merely illustrative, in actual use, all interior of all processes is being obtained
Deposit fragment data can also be used other malice detection methods and carries out Malicious Code Detection that is, on the basis of memory evidence obtaining.
The embodiment of the present invention also provides a kind of controller comprising memory and processor, the memory are stored with meter
Calculation machine program, described program can be realized the Linux platform proceeding internal memory malicious code when being executed by the processor and take
The step of card method.
The embodiment of the present invention also provides a kind of computer readable storage medium, for storing computer instruction, described instruction
The step of realizing the Linux platform proceeding internal memory malicious code evidence collecting method when by a computer or processor execution.
The embodiment of the present invention utilizes the proceeding internal memory mapped file of (SuSE) Linux OS, determines the memory address cloth of process
Office, thus accurately in acquisition system each process complete memory, the memory information between each process is mutually indepedent, in turn
Malicious code effectively in discovery linux system memory, method is simply accurate, improves the safety of system Linux.The present invention
The original memory evidence obtaining of more traditional system avoids the complete acquisition and independent acquisition of each proceeding internal memory, inside access card
There is versatility and stability in method.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though
So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
For the equivalent embodiment of equivalent variations, but anything that does not depart from the technical scheme of the invention content, according to the technical essence of the invention
Any simple modification, equivalent change and modification to the above embodiments, all of which are still within the scope of the technical scheme of the invention.
Claims (10)
1. a kind of Linux platform proceeding internal memory malicious code evidence collecting method characterized by comprising
All processes of linux system are traversed, the Memory Mapping File of all processes is read;
The corresponding all memory fragment datas of the process, program file path are obtained based on each proceeding internal memory mapped file
One of information and dynamic library file path information are a variety of, and the dynamic library file path information includes Memory Mapping File
In include the corresponding dynamic library file path information of program file and the corresponding dynamic library file path information of program file;
According to the corresponding all memory fragment datas of each process and program file routing information, alternatively, all memory segments
According to the dynamic library file path information that includes in Memory Mapping File, alternatively, the corresponding dynamic library file path of program file
The malicious code of the infomation detection process.
2. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 1, which is characterized in that
All processes of the traversal linux system, read the Memory Mapping File of all processes, comprising:
Obtain linux system process number maximum value;
Be starting point with process number 1, using the process number maximum value as terminal, traverse process catalogue/proc under process subdirectory/
Proc/pid/ obtains all processes of system;
For each process subdirectory/proc/pid/, the corresponding Memory Mapping File of the process is obtained.
3. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 2, which is characterized in that
During process subdirectory/proc/pid/ under the traversal process catalogue/proc, if traversal to default process, directly
It connects and skips, continue to traverse next process, the default process includes kernel thread and memory evidence obtaining process.
4. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 1, which is characterized in that
All internal storage datas of each process are obtained based on the proceeding internal memory mapped file, comprising:
Using the process for currently carrying out obtaining memory information as target process, the corresponding memory mapping text of the target process is read
Part parses wherein full memory piece segment information, obtains initial address and the end address of each memory segment;
Calling system debugging function ptrace reads internal storage data of each memory segment between initial address to end address;
Calling system file manipulation function open/write stores the corresponding internal storage data of each memory segment read, directly
All memory segments reading to the target process finishes, and the internal storage data of the target process individually stores a catalogue.
5. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 4, which is characterized in that
The malicious code of the process is detected according to the corresponding all memory fragment datas of each process and program file routing information,
Include:
The pre-set code section in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process;
According to described program file path information acquiring program file;
The corresponding program header structure of described program file is analyzed, the corresponding pre-set code section of the program file is obtained;
By in the proceeding internal memory pre-set code section and the corresponding pre-set code section of program file compare, if it exists not
Together, then it represents that there are malicious code, export the program file and corresponding memory fragment data.
6. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 4, which is characterized in that
According to the dynamic library file path letter for including in the corresponding all memory fragment datas of each process and Memory Mapping File
Breath detects the malicious code of the process, comprising:
The pre-set code section in proceeding internal memory is obtained according to the corresponding all memory fragment datas of each process;
According to the dynamic library file path acquisition of information dynamic library file for including in Memory Mapping File;
The corresponding program header file of the dynamic library file is analyzed, the corresponding pre-set code section of the dynamic library file is obtained;
By in the proceeding internal memory pre-set code section and the corresponding pre-set code section of dynamic library file compare, if it exists not
Together, then it represents that there are malicious codes, export dynamic library file and corresponding memory fragment data.
7. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 5 or 6, which is characterized in that
The pre-set code section is .text segment data.
8. Linux platform proceeding internal memory malicious code evidence collecting method according to claim 4, which is characterized in that
According to the malicious code of the corresponding program file of each process corresponding dynamic library file path infomation detection process, packet
It includes:
According to the corresponding dynamic library file path information of the corresponding program file of each process, the corresponding dynamic base of the process is obtained
Listed files;
Obtain the dynamic library file information for including in the corresponding Memory Mapping File of the process;
The living document information for including in the Memory Mapping File and the dynamic library file list are compared;
If including one or more not living documents in the dynamic library file list, table in the Memory Mapping File
Show there are malicious code, exports the dynamic library file path and corresponding memory fragment data.
9. a kind of controller comprising memory and processor, which is characterized in that
The memory is stored with computer program, and described program can be realized claim 1 when being executed by the processor
The step of to method described in any one of 8 claims.
10. a kind of computer readable storage medium, for storing computer instruction, which is characterized in that
Described instruction is realized when by a computer or processor execution such as any one of claim 1 to 8 claim institute
The step of method stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910094079.1A CN109918907B (en) | 2019-01-30 | 2019-01-30 | Method, controller and medium for obtaining evidence of malicious codes in process memory of Linux platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910094079.1A CN109918907B (en) | 2019-01-30 | 2019-01-30 | Method, controller and medium for obtaining evidence of malicious codes in process memory of Linux platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109918907A true CN109918907A (en) | 2019-06-21 |
CN109918907B CN109918907B (en) | 2021-05-25 |
Family
ID=66961167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910094079.1A Active CN109918907B (en) | 2019-01-30 | 2019-01-30 | Method, controller and medium for obtaining evidence of malicious codes in process memory of Linux platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918907B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321703A (en) * | 2019-07-02 | 2019-10-11 | 北京智游网安科技有限公司 | A kind of method, storage medium and terminal device detecting application program illegal invasion |
CN110543765A (en) * | 2019-08-28 | 2019-12-06 | 南京市晨枭软件技术有限公司 | malicious software detection method |
CN110611659A (en) * | 2019-08-21 | 2019-12-24 | 南瑞集团有限公司 | Method, device and system for protecting service essence of power monitoring system |
CN110909352A (en) * | 2019-11-26 | 2020-03-24 | 杭州安恒信息技术股份有限公司 | Malicious process detection method under Linux server |
CN111008378A (en) * | 2019-11-29 | 2020-04-14 | 四川效率源信息安全技术股份有限公司 | Method for cleaning malicious codes in Seagate hard disk firmware area |
CN111240949A (en) * | 2020-01-13 | 2020-06-05 | 奇安信科技集团股份有限公司 | Method and device for determining software use frequency in domestic operating system |
CN111309396A (en) * | 2020-02-14 | 2020-06-19 | 北京字节跳动网络技术有限公司 | System library access method and device and computer readable storage medium |
CN113742002A (en) * | 2021-09-10 | 2021-12-03 | 上海达梦数据库有限公司 | Method, device, equipment and storage medium for acquiring dependency relationship of dynamic library |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1987717A (en) * | 2005-12-23 | 2007-06-27 | 联想(北京)有限公司 | Method and system for real time detecting process integrity |
CN101154258A (en) * | 2007-08-14 | 2008-04-02 | 电子科技大学 | Automatic analyzing system and method for dynamic action of malicious program |
CN101414339A (en) * | 2007-10-15 | 2009-04-22 | 北京瑞星国际软件有限公司 | Method for protecting proceeding internal memory and ensuring drive program loading safety |
CN102054149A (en) * | 2009-11-06 | 2011-05-11 | 中国科学院研究生院 | Method for extracting malicious code behavior characteristic |
CN102609649A (en) * | 2012-02-06 | 2012-07-25 | 北京百度网讯科技有限公司 | Method and device for collecting malicious software automatically |
CN102622536A (en) * | 2011-01-26 | 2012-08-01 | 中国科学院软件研究所 | Method for catching malicious codes |
CN102902914A (en) * | 2012-09-05 | 2013-01-30 | 福建伊时代信息科技股份有限公司 | Method and device for achieving terminal tracelessness |
CN104077522A (en) * | 2014-06-30 | 2014-10-01 | 江苏华大天益电力科技有限公司 | Process integrity detection method of operation system |
CN104376261A (en) * | 2014-11-27 | 2015-02-25 | 南京大学 | Method for automatically detecting malicious process under forensics scene |
CN104715191A (en) * | 2015-03-26 | 2015-06-17 | 广州快飞计算机科技有限公司 | Starting detection and protection method and system of embedded main program |
CN104714831A (en) * | 2015-03-31 | 2015-06-17 | 北京奇虎科技有限公司 | Method and device for detecting parasitic process in virtual machine |
CN105868632A (en) * | 2016-04-20 | 2016-08-17 | 北京金山安全软件有限公司 | Method and device for intercepting and releasing DHCP (dynamic host configuration protocol) |
CN106096391A (en) * | 2016-06-02 | 2016-11-09 | 北京金山安全软件有限公司 | Process control method and user terminal |
CN106096410A (en) * | 2016-06-02 | 2016-11-09 | 北京金山安全软件有限公司 | Process control method and user terminal |
CN106295319A (en) * | 2016-08-02 | 2017-01-04 | 中标软件有限公司 | Operating system safety protecting method |
CN106778276A (en) * | 2016-12-29 | 2017-05-31 | 北京安天网络安全技术有限公司 | A kind of method and system for detecting incorporeity file malicious code |
CN106874761A (en) * | 2016-12-30 | 2017-06-20 | 北京邮电大学 | A kind of Android system malicious application detection method and system |
CN106919837A (en) * | 2016-10-20 | 2017-07-04 | 深圳市安之天信息技术有限公司 | A kind of unknown self-starting recognition methods of malicious code and system |
CN108156175A (en) * | 2018-01-22 | 2018-06-12 | 成都汇智远景科技有限公司 | To the access method of shared storage information under cloud computing platform |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
CN109033828A (en) * | 2018-07-25 | 2018-12-18 | 山东省计算中心(国家超级计算济南中心) | A kind of Trojan detecting method based on calculator memory analytical technology |
CN109063471A (en) * | 2018-07-17 | 2018-12-21 | 广州大学 | A kind of guard method of SGX operation |
-
2019
- 2019-01-30 CN CN201910094079.1A patent/CN109918907B/en active Active
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1987717A (en) * | 2005-12-23 | 2007-06-27 | 联想(北京)有限公司 | Method and system for real time detecting process integrity |
CN101154258A (en) * | 2007-08-14 | 2008-04-02 | 电子科技大学 | Automatic analyzing system and method for dynamic action of malicious program |
CN101414339A (en) * | 2007-10-15 | 2009-04-22 | 北京瑞星国际软件有限公司 | Method for protecting proceeding internal memory and ensuring drive program loading safety |
CN102054149A (en) * | 2009-11-06 | 2011-05-11 | 中国科学院研究生院 | Method for extracting malicious code behavior characteristic |
CN102622536A (en) * | 2011-01-26 | 2012-08-01 | 中国科学院软件研究所 | Method for catching malicious codes |
CN102609649A (en) * | 2012-02-06 | 2012-07-25 | 北京百度网讯科技有限公司 | Method and device for collecting malicious software automatically |
CN102902914A (en) * | 2012-09-05 | 2013-01-30 | 福建伊时代信息科技股份有限公司 | Method and device for achieving terminal tracelessness |
CN104077522A (en) * | 2014-06-30 | 2014-10-01 | 江苏华大天益电力科技有限公司 | Process integrity detection method of operation system |
CN104376261A (en) * | 2014-11-27 | 2015-02-25 | 南京大学 | Method for automatically detecting malicious process under forensics scene |
CN104715191A (en) * | 2015-03-26 | 2015-06-17 | 广州快飞计算机科技有限公司 | Starting detection and protection method and system of embedded main program |
CN104714831A (en) * | 2015-03-31 | 2015-06-17 | 北京奇虎科技有限公司 | Method and device for detecting parasitic process in virtual machine |
CN105868632A (en) * | 2016-04-20 | 2016-08-17 | 北京金山安全软件有限公司 | Method and device for intercepting and releasing DHCP (dynamic host configuration protocol) |
CN106096391A (en) * | 2016-06-02 | 2016-11-09 | 北京金山安全软件有限公司 | Process control method and user terminal |
CN106096410A (en) * | 2016-06-02 | 2016-11-09 | 北京金山安全软件有限公司 | Process control method and user terminal |
CN106295319A (en) * | 2016-08-02 | 2017-01-04 | 中标软件有限公司 | Operating system safety protecting method |
CN106919837A (en) * | 2016-10-20 | 2017-07-04 | 深圳市安之天信息技术有限公司 | A kind of unknown self-starting recognition methods of malicious code and system |
CN106778276A (en) * | 2016-12-29 | 2017-05-31 | 北京安天网络安全技术有限公司 | A kind of method and system for detecting incorporeity file malicious code |
CN106874761A (en) * | 2016-12-30 | 2017-06-20 | 北京邮电大学 | A kind of Android system malicious application detection method and system |
CN108156175A (en) * | 2018-01-22 | 2018-06-12 | 成都汇智远景科技有限公司 | To the access method of shared storage information under cloud computing platform |
CN108200106A (en) * | 2018-04-02 | 2018-06-22 | 浙江九州量子信息技术股份有限公司 | A kind of Internet of Things safety detection means of defence |
CN109063471A (en) * | 2018-07-17 | 2018-12-21 | 广州大学 | A kind of guard method of SGX operation |
CN109033828A (en) * | 2018-07-25 | 2018-12-18 | 山东省计算中心(国家超级计算济南中心) | A kind of Trojan detecting method based on calculator memory analytical technology |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110321703A (en) * | 2019-07-02 | 2019-10-11 | 北京智游网安科技有限公司 | A kind of method, storage medium and terminal device detecting application program illegal invasion |
CN110611659A (en) * | 2019-08-21 | 2019-12-24 | 南瑞集团有限公司 | Method, device and system for protecting service essence of power monitoring system |
CN110611659B (en) * | 2019-08-21 | 2022-08-09 | 南瑞集团有限公司 | Method, device and system for protecting service essence of power monitoring system |
CN110543765A (en) * | 2019-08-28 | 2019-12-06 | 南京市晨枭软件技术有限公司 | malicious software detection method |
CN110909352A (en) * | 2019-11-26 | 2020-03-24 | 杭州安恒信息技术股份有限公司 | Malicious process detection method under Linux server |
CN111008378A (en) * | 2019-11-29 | 2020-04-14 | 四川效率源信息安全技术股份有限公司 | Method for cleaning malicious codes in Seagate hard disk firmware area |
CN111008378B (en) * | 2019-11-29 | 2023-08-01 | 四川效率源信息安全技术股份有限公司 | Method for cleaning malicious codes in hard disk firmware area |
CN111240949A (en) * | 2020-01-13 | 2020-06-05 | 奇安信科技集团股份有限公司 | Method and device for determining software use frequency in domestic operating system |
CN111240949B (en) * | 2020-01-13 | 2024-04-26 | 奇安信科技集团股份有限公司 | Method and device for determining software use frequency in domestic operating system |
CN111309396A (en) * | 2020-02-14 | 2020-06-19 | 北京字节跳动网络技术有限公司 | System library access method and device and computer readable storage medium |
CN111309396B (en) * | 2020-02-14 | 2023-08-15 | 北京字节跳动网络技术有限公司 | System library access method and device and computer readable storage medium |
CN113742002A (en) * | 2021-09-10 | 2021-12-03 | 上海达梦数据库有限公司 | Method, device, equipment and storage medium for acquiring dependency relationship of dynamic library |
Also Published As
Publication number | Publication date |
---|---|
CN109918907B (en) | 2021-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109918907A (en) | Linux platform proceeding internal memory malicious code evidence collecting method, controller and medium | |
US11625485B2 (en) | Method of malware detection and system thereof | |
US10165001B2 (en) | Method and device for processing computer viruses | |
CN106462703B (en) | Patch file analysis system and analysis method | |
CN104346148B (en) | Obtain method, the apparatus and system of program feature consumption information | |
US20130247198A1 (en) | Emulator updating system and method | |
CN107004088B (en) | Determining device, determining method and recording medium | |
CN105138916B (en) | Multi-trace rogue program characteristic detection method based on data mining | |
WO2007056933A1 (en) | A method for identifying unknown virus and deleting it | |
CN101183414A (en) | Program detection method, device and program analyzing method | |
CN106203116A (en) | The detection method of a kind of Malware and device | |
CN103294951B (en) | A kind of malicious code sample extracting method based on document type bug and system | |
CN105653949B (en) | A kind of malware detection methods and device | |
WO2019047442A1 (en) | Method and system for bypassing function call chain detection in ios application | |
CN110414236A (en) | A kind of detection method and device of malicious process | |
CN108898012B (en) | Method and apparatus for detecting illegal program | |
CN113132311A (en) | Abnormal access detection method, device and equipment | |
CN113312615A (en) | Terminal detection and response system | |
KR101327740B1 (en) | apparatus and method of collecting action pattern of malicious code | |
CN105550573B (en) | The method and apparatus for intercepting bundled software | |
KR101308866B1 (en) | Open type system for analyzing and managing malicious code | |
CN102222201A (en) | File scanning method and device thereof | |
Tan et al. | Attack provenance tracing in cyberspace: Solutions, challenges and future directions | |
CN117478373B (en) | File-free attack investigation method and system based on memory evidence obtaining | |
Quante | Online construction of dynamic object process graphs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |